General
-
Target
c7c9f8f68348fbd26aae20c9ccb1aefd1cfce63897efa4c64abe7ac480253259.zip
-
Size
2.6MB
-
Sample
240402-qer9naah2w
-
MD5
50fdfe71a006963e4a0359884e3b1d1b
-
SHA1
2efb4a13d9f1c67ee9f6649448b5c778028106e1
-
SHA256
e8494f6e8bb3473d2826711a2e5b735e23ec8fc0f6b7ce0b939856f6f264dc93
-
SHA512
990bbdf06f816af8d40b8e401f688ff4db6e59bf591e0189c809af4124a4056d6bc7b81973dc1e14aa621dde58dedf6aed1d30384a11bf546c0f6b49e14328f4
-
SSDEEP
49152:mlCjw5Tg1XLhwEFgn8TN3ldJJhiw/QmW7QXCbsy+D2s8b:mscxg1iE6n8TlldLhiw7XaZ425b
Behavioral task
behavioral1
Sample
c7c9f8f68348fbd26aae20c9ccb1aefd1cfce63897efa4c64abe7ac480253259.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7c9f8f68348fbd26aae20c9ccb1aefd1cfce63897efa4c64abe7ac480253259.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Desktop\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Favorites\MSN Websites\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\5XtEx_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\O6T8af_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\O6T8af_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Pictures\O6T8af_readme.txt
avaddon
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
c7c9f8f68348fbd26aae20c9ccb1aefd1cfce63897efa4c64abe7ac480253259.exe
-
Size
4.8MB
-
MD5
affa6575a3ff529c583fab38ff9f59e5
-
SHA1
a4d2dde718cc10d6ac12e4ec1f602a1050746aa5
-
SHA256
c7c9f8f68348fbd26aae20c9ccb1aefd1cfce63897efa4c64abe7ac480253259
-
SHA512
c7ea550c214c3d4cf0686f50e2644b6fe569397bc1d4b0363da173e9a9889ce290f33f6a4e9215aba6cf1deef0be73abdf4b44a8070204d75868d845b34a8767
-
SSDEEP
98304:bw3OKBzMFxybbbbpNGWeEi4DtrRKm40djW1mGaHBad6s:bw3y6bbbbpNYwDdjW1zqEn
Score10/10-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (155) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1